Static task
static1
Behavioral task
behavioral1
Sample
2af0e78f57847f3eaba5318468f2232fd3b73f4b9dff774b5514f411b9294ec1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2af0e78f57847f3eaba5318468f2232fd3b73f4b9dff774b5514f411b9294ec1.exe
Resource
win10v2004-20220812-en
General
-
Target
2af0e78f57847f3eaba5318468f2232fd3b73f4b9dff774b5514f411b9294ec1
-
Size
346KB
-
MD5
48d7bf4110150bf2de86bde08d846840
-
SHA1
c9453a978f8bc188bfbc411a7e781d0b5d18f61d
-
SHA256
2af0e78f57847f3eaba5318468f2232fd3b73f4b9dff774b5514f411b9294ec1
-
SHA512
adb06b39b699568bd67431909781ef7775b6fc77d2ce8ddfec447b7d8f815d85d464dbd8df8f727cc41b8e8154594bfac5ef1eb678b35ba71759c6f163c258c3
-
SSDEEP
3072:B3gA9uQEHAazFKgjZmMQ3tAg0FupWHaDvu/l55kfDDffffNfffLffffqyffAfffj:B3gA9912FDjZX0tAOpIUPkrh/2vs
Malware Config
Signatures
Files
-
2af0e78f57847f3eaba5318468f2232fd3b73f4b9dff774b5514f411b9294ec1.exe windows x86
97d9d36d6bd01017d8931877af5a7276
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DlgDirListComboBoxW
DdeAddData
GetKBCodePage
DestroyAcceleratorTable
RealChildWindowFromPoint
SetMenuContextHelpId
GetTabbedTextExtentW
GetAltTabInfoW
WinHelpW
GetWindowRect
CharLowerBuffA
OpenClipboard
GetWindowModuleFileNameA
EnableScrollBar
MessageBoxA
GetWindowTextLengthA
MoveWindow
GetWindowPlacement
DrawIcon
DestroyIcon
GetDlgCtrlID
SetWindowTextA
FillRect
GetParent
EnableWindow
GetDlgItemTextA
SetCursor
UpdateWindow
GetClassInfoA
wvsprintfA
LoadStringA
GetSysColor
GetSysColorBrush
IsDialogMessageA
SendMessageA
GetSystemMetrics
SetRect
FindWindowA
IntersectRect
SubtractRect
CharPrevA
DestroyWindow
CreateDialogParamA
CharNextA
GetWindowTextA
WaitForInputIdle
GetWindowLongA
BeginPaint
EndPaint
SetWindowLongA
GetClientRect
ClientToScreen
SetWindowPos
GetWindowDC
EndDialog
GetDlgItem
ShowWindow
DialogBoxParamA
GetDesktopWindow
wsprintfA
MsgWaitForMultipleObjects
PeekMessageA
DefWindowProcA
PostMessageA
KillTimer
PostQuitMessage
SetTimer
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
GetDC
ReleaseDC
ExitWindowsEx
SendDlgItemMessageA
IsWindow
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
ole32
StgIsStorageFile
GetRunningObjectTable
CoCreateInstance
StgOpenStorage
CoTaskMemFree
StringFromCLSID
CoUninitialize
CoInitialize
CoCreateGuid
CreateItemMoniker
advapi32
RegOpenKeyA
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenThreadToken
RegDeleteKeyA
RegQueryValueA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
IsDebuggerPresent
InterlockedDecrement
InterlockedIncrement
ExitThread
GetSystemTimeAsFileTime
GetDateFormatA
GetTimeFormatA
DeleteFileA
lstrlenW
WriteFile
QueryPerformanceFrequency
CreateEventA
Sleep
lstrcatA
CompareStringA
CompareStringW
GetVersionExA
SetFilePointer
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
FreeLibrary
GetProcAddress
LoadLibraryA
LockResource
LoadResource
SizeofResource
FindResourceA
CreateProcessA
GetSystemDefaultLCID
GlobalHandle
VerLanguageNameA
SetCurrentDirectoryA
GetPrivateProfileSectionA
WaitForSingleObject
GetSystemInfo
GetModuleHandleW
IsValidCodePage
FlushFileBuffers
LocalFree
FormatMessageA
GetDiskFreeSpaceA
_lclose
OpenFile
GetDriveTypeA
lstrcpynA
CreateDirectoryA
GetFileAttributesA
RemoveDirectoryA
GetExitCodeProcess
GetCurrentProcess
GetCurrentThread
GetLocaleInfoA
FreeEnvironmentStringsW
lstrlenA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
SetUnhandledExceptionFilter
WideCharToMultiByte
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
DeleteCriticalSection
InitializeCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapSize
HeapReAlloc
LeaveCriticalSection
TlsFree
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetModuleFileNameA
GetTempPathA
EnterCriticalSection
GetVersion
GetCommandLineA
GetStartupInfoA
LocalAlloc
ReleaseMutex
SetupComm
DeleteAtom
DuplicateHandle
CallNamedPipeA
InitAtomTable
MapUserPhysicalPagesScatter
VerifyVersionInfoA
FreeEnvironmentStringsA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
UnmapViewOfFile
IsBadWritePtr
MapViewOfFile
CreateFileMappingA
GetPrivateProfileStringA
lstrcpyA
WritePrivateProfileStringA
GetTempFileNameA
GetWindowsDirectoryA
SetErrorMode
GetPrivateProfileIntA
ExpandEnvironmentStringsA
lstrcmpA
lstrcmpiA
GetTickCount
GetExitCodeThread
CreateThread
MultiByteToWideChar
CopyFileA
SetLastError
GetLastError
GlobalFree
GlobalUnlock
ReadFile
GlobalLock
CloseHandle
GlobalAlloc
GetFileSize
CreateFileA
SetStdHandle
LCMapStringW
LCMapStringA
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
FindClose
VirtualQuery
VirtualProtect
FindFirstFileA
GetStringTypeA
SearchPathA
GetShortPathNameA
SetEvent
ResetEvent
QueryPerformanceCounter
SystemTimeToFileTime
RtlUnwind
HeapAlloc
HeapFree
RaiseException
ExitProcess
TerminateProcess
GetModuleHandleA
Sections
.text Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 111KB - Virtual size: 195KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ